Exam Details

  • Exam Code
    :312-49V9
  • Exam Name
    :ECCouncil Computer Hacking Forensic Investigator (V9)
  • Certification
    :Certified Ethical Hacker
  • Vendor
    :EC-COUNCIL
  • Total Questions
    :486 Q&As
  • Last Updated
    :May 08, 2024

EC-COUNCIL Certified Ethical Hacker 312-49V9 Questions & Answers

  • Question 481:

    Computer security logs contain information about the events occurring within an organization's systems and networks. Application and Web server log files are useful in detecting web attacks. The source, nature, and time of the attack can be determined by _________of the compromised system.

    A. Analyzing log files

    B. Analyzing SAM file

    C. Analyzing rainbow tables

    D. Analyzing hard disk boot records

  • Question 482:

    Which root folder (hive) of registry editor contains a vast array of configuration information for the system, including hardware settings and software settings?

    A. HKEY_USERS

    B. HKEY_CURRENT_USER

    C. HKEY_LOCAL_MACHINE

    D. HKEY-CURRENT_CONFIG

  • Question 483:

    Wireless network discovery tools use two different methodologies to detect, monitor and log a WLAN device (i.e. active scanning and passive scanning). Active scanning methodology involves ____________and waiting for responses from available wireless networks.

    A. Broadcasting a probe request frame

    B. Sniffing the packets from the airwave

    C. Scanning the network

    D. Inspecting WLAN and surrounding networks

  • Question 484:

    During the seizure of digital evidence, the suspect can be allowed touch the computer system.

    A. True

    B. False

  • Question 485:

    Which one of the following statements is not correct while preparing for testimony?

    A. Go through the documentation thoroughly

    B. Do not determine the basic facts of the case before beginning and examining the evidence

    C. Establish early communication with the attorney

    D. Substantiate the findings with documentation and by collaborating with other computer forensics professionals

  • Question 486:

    What is the first step that needs to be carried out to investigate wireless attacks?

    A. Obtain a search warrant

    B. Identify wireless devices at crime scene

    C. Document the scene and maintain a chain of custody

    D. Detect the wireless connections

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 312-49V9 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.